SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.
To install SentinelSSH, make sure you have Go installed on your system (version 1.16 or later), then run:
go install github.com/harshinsecurity/sentinelssh/cmd/sentinelssh@latest
After installation, you can run SentinelSSH directly from the command line:
sentinelssh [flags] [targets...]
--port, -p
: Target port number (default: 22)--timeout, -t
: Connection timeout in seconds (default: 5)--concurrency, -c
: Number of concurrent scans (default: 100)--output, -o
: Output file for detailed results (CSV format)--file, -f
: File containing list of targets
Scan a single IP:
sentinelssh 192.168.1.1
Scan a domain:
sentinelssh example.com
Scan multiple targets:
sentinelssh example.com 192.168.1.1 10.0.0.1
Scan targets from a file:
sentinelssh -f targets.txt
Save results to a CSV file:
sentinelssh -o results.csv 192.168.1.1 example.com
Custom port and higher concurrency:
sentinelssh --port 2222 --concurrency 200 192.168.1.0/24
- Targeted CVE-2024-6387 detection
- Support for IP addresses, domain names, and CIDR ranges
- High-speed concurrent scanning
- Comprehensive version analysis
- Detailed, color-coded console output
- CSV export for further analysis
- Customizable scan parameters
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please feel free to submit a Pull Request.